All Apps and Add-ons

evtsys to syslog for windows events

coreyf311
Path Finder

collecting windows logs using evtsys and forwarding to a syslog server. I have a UF installed on the universal forwarder reading the windows logs created by evtsys. I have tried using sourcetype=WinEventLog:Security but the logs do not match what I see in the samples directory from the Splunk_TA_windows apps so these events are not extracted per the app. Is there a TA or sourcetype i can use to get evtsys logs parsed correclty? trying to avoid a custom props/transforms from scratch to parse all this data.

Tags (1)
0 Karma

efika
Communicator

Did you manage to find a solution other than writing your own props/transforms ?

0 Karma

FrankVl
Ultra Champion

Can you perhaps share a few sample logs, for those of us not familiar with evtsys? Perhaps someone recognizes it as a format that is supported by some Splunk add-on or one of the sourcetypes supported by Splunk TA Windows (perhaps it looks like snare logs?).

0 Karma
Get Updates on the Splunk Community!

SOCin’ it to you at Splunk University

Splunk University is expanding its instructor-led learning portfolio with dedicated Security tracks at .conf25 ...

Credit Card Data Protection & PCI Compliance with Splunk Edge Processor

Organizations handling credit card transactions know that PCI DSS compliance is both critical and complex. The ...

Stay Connected: Your Guide to July Tech Talks, Office Hours, and Webinars!

What are Community Office Hours?Community Office Hours is an interactive 60-minute Zoom series where ...